Infrastructure White Papers

Results 1 - 25 of 922Sort Results By:Published Date | Title | Company Name
By: Schneider Electric     Published Date: Mar 03, 2015

This paper discusses making realistic improvements to power, cooling, racks, physical security, monitoring, and lighting. The focus of this paper is on small server rooms and branch offices with up to 10kW of IT load.

Tags : it equipment, small server rooms, avoiding it downtime, how to avoid it downtime, improving small server rooms, servers, small business networks, infrastructure
    
By: Cisco     Published Date: Mar 03, 2015

Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking. At the same time, the Internet of Everything (IoE) is accelerating. Opportunities are opening up for businesses and attackers alike as more things come online, along with the people, processes, and data that interact with them.

Tags : security, detection, blocking, data, data management, cloud computing, infrastructure
    
By: Riverbed     Published Date: Feb 26, 2015

How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? Just as enterprises take advantage of applications hosted in multiple locations (i.e., public clouds, private clouds, or SaaS applications), they take advantage of different networks for different reasons (i.e. performance, backup, remote access). These could be MPLS links, ATM links, traditional Internet connections, or VPN lines. Enterprises, in effect, are already building hybrid networks, and those combined with the elements of hybrid clouds create the hybrid enterprise.

Tags : private clouds, public clouds, saas applications, vpn lines, hybrid clouds, hybrid enterprise, application performance management, business intelligence
    
By: Riverbed     Published Date: Feb 26, 2015

In the world of network management, knowledge is power. But many organizations know a lot less about their network than they think. With proper network auditing and configuration, businesses can fill this knowledge gap.

Tags : network management, network auditing, automation, key network management processes, audit, network infrastructure, network performance, best practices
    
By: Digital Realty Trust     Published Date: Feb 25, 2015

During the transition, the company wanted to be able to take advantage of millisecond trade processing declines, and to pass these benefits on to its own clients.

Tags : financial services, trade processing, data center, connectivity, data center, it management, data management, infrastructure
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: McAfee     Published Date: Feb 25, 2015

This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.

Tags : mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection, security, internet security, endpoint protection
    
By: Digital Realty Trust     Published Date: Feb 24, 2015

The threats facing businesses today are arguably the most aggressive and dynamic in history, with data centersí infrastructure comprising a paramount element in the first line of defense for many companies. The advent of mobile and cloud computing has compounded the calculus, driving increased dependence on third parties as significant contributors to a companyís enterprise security posture. As the trend toward data center outsourcing continues to grow, organizations find themselves relying heavily on the ability of their data center providers to deliver levels of security that meet their own rigorous standards. The providerís security plan is often integral to the foundation for a clientís in-house protection mechanisms that support the confidentiality, integrity and availability of its data, and must therefore integrate seamlessly into a clientís security plan.

Tags : data center, security, infrastructure, cloud computing, it management, business intelligence
    
By: Digital Realty Trust     Published Date: Feb 24, 2015

Managing the regulatory landscape in the data center. Enterprise data center clients operate in some of the most complex and regulated environments in the world. These clients need assurance that their partners are up to the challenge of meeting their needs and operating effectively within a dynamic ecosystem. For the client-focused data center solutions provider, this presents a perfect opportunity to differentiate its services from those of other solution providers who simply provide five 9ís.

Tags : compliance, data center, management, business intelligence, service management, infrastructure
    
By: Digital Realty Trust     Published Date: Feb 24, 2015

Cloud IaaS and managed hosting company contracts scalable data center solution to support its growth strategy.

Tags : cloud iaas, data center, cloud computing, development, it management, data management, infrastructure
    
By: Digital Realty Trust     Published Date: Feb 24, 2015

The data center in Hillsboro is expected to play a critical role in NetAppís plans to continually expand the services it offers to its customers.

Tags : data center, infrastructure management, access control, physical security, it management, business intelligence, cloud computing, infrastructure
    
By: Intel Security     Published Date: Feb 23, 2015

This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture
    
By: Intel Security     Published Date: Feb 23, 2015

This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.

Tags : gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Juniper Networks     Published Date: Feb 18, 2015

In this Webinar, experts from IDC, Shutterstock and Juniper discuss how to transition to network virtualization and look at benefits of SDN and automating their networks.

Tags : juniper networks, network automation, network performance management, database development, infrastructure
    
By: Juniper Networks     Published Date: Feb 18, 2015

Get our Practical Guide to enhancing business agility with network automation and orchestration. You will learn how simplifying orchestration and operations will help you unlock the value in your applications, and maximize business efficiency.†

Tags : business agility, automation, data center, network operation, reduced latency, application management, network architecture, cloud computing
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn about the challenges as you deploy hybrid clouds. The Forrester report analyzes the views and approaches of IT decision-makers who have already begun their journey to the hybrid cloud.

Tags : hybrid clouds, network, data center, automation, network virtualization, firewalls, database security, virtualization
    
By: Juniper Networks     Published Date: Feb 18, 2015

Get expert advise on how to keep your private cloud secure with our Top 10 Considerations slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your private cloud environment.

Tags : cloud, private cloud, security, password, virtualization, business intelligence, database development, database security
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn how to improve your business agility in this Whitepaper on building a business case for network virtualization. Find out how your network can deliver new levels of performance and resiliency.

Tags : business agility, network architecture, virtualization, network, cloud computing, data center, data management, firewalls
    
By: Juniper Networks     Published Date: Feb 18, 2015

Improve application performance with a simplified network architecture. This Whitepaper on the top 5 benefits of a modernized data center architecture shows you how to optimize your network for business critical applications.

Tags : data center, infrastructure, business applications, it budgets, vendor lock-in, virtualization, network architecture, data center design and management
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out how new applications and virtualized environments are driving the need for increased bandwidth and network scale in this new Report. Read how scalability is fuelling the need for 10GbE networks.

Tags : juniper, data center, bandwidth management, database development, virtualization, cloud computing, infrastructure
    
By: CA Technologies     Published Date: Feb 09, 2015

This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers.

Tags : complete it visualization, it operations visibility, application visibility, infrastructure management, uim, it management, enterprise applications, data management
    
By: CA Technologies     Published Date: Feb 09, 2015

This paper provides information on how CA Unified Infrastructure Management (CA UIM) delivers the essential capabilities needed to help you proactively monitor and manage alarms, performance and SLAs across even the most dynamic and complex environments.

Tags : ca uim, it monitoring, client mobility, cloud services, ca unified infrastructure management, it infrastructure and services, monitoring, business activity monitoring
    
By: Avaya     Published Date: Feb 06, 2015

This paper takes a look at some of the top challenges the midmarket is facing as well as considerations to keep in mind when choosing a UC&C option. After a rough few years, the midmarket is no longer putting off investing in technology. According to KPMG, 60 percent of midmarket companies plan to increase capital spending, with the highest priority being information technology.

Tags : challenges of midmarket, midmarket companies, midmarket trends, networking, mobile computing, mobile data systems, mobile workers, application integration
    
By: Avaya     Published Date: Jan 28, 2015

The Hitchhiker's Guide to the Software-Defined Data Center is a Z K Research paper aiming to provide you with the necessary information to make an informed choice on choosing the right SDDC solution provider for your business.

Tags : software defined data center, sddc, a guide to sddc, sddc solution providers, the network requirements of an sddc, avaya sddc solutions, business management, data center design and management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.